De Aller-Bedste Bøger - over 12 mio. danske og engelske bøger
Levering: 1 - 2 hverdage

Bøger i Security and Cryptology serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings
     
    1.087,95 kr.

    This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. multi-party computation; outsourcing computation; two-party computation;

  • - 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
     
    759,95 kr.

    This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016.The 13 full papers together with 2 short papers were carefully reviewed and selected from 34 submissions. the focus on the workshop was on following topics: access control, data protection, mobile security, privacy, security and trust policies, trust models.  

  • - 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers
     
    810,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Security for Information Technology and Communications, SECITC 2016, held in Bucharest, Romania, in June 2016. The 16 revised full papers were carefully reviewed and selected from 35 submissions.

  • - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings
     
    972,95 kr.

    This book constitutes the refereed proceedings of the 7th International Conference on Decision and Game Theory for Security, GameSec 2016, held in New York, NY, USA, in November 2016. The 18 revised full papers presented together with 8 short papers and 5 poster papers were carefully reviewed and selected from 40 submissions.

  • - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings
     
    901,95 kr.

    This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016. The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions.

  • - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings
     
    952,95 kr.

    This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017. The 25 papers presented in this volume were carefully reviewed and selected from 77 submissions. CT-RSA has become a major publication venue in cryptography.

  • - Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers
     
    800,95 kr.

    Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications. The book provides selected papers of the Second International Workshop on Enterprise Security held in Vancouver, Canada, November 30-December 3, 2016 in conjunction with CloudCom 2015.The 11 papers provide a comprehensive research into various areas of enterprise security such as protection of data, privacy and rights, data ownership, trust, unauthorized access and big data ownership, studies and analysis to reduce risks imposed by data leakage, hacking and challenges of Cloud forensics.

  • - 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings
     
    925,95 kr.

    This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions.

  • - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II
     
    574,95 kr.

    The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions.

  • - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II
     
    819,95 kr.

    The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. and cloud computing and security; Part III: cloud computing and security;

  • - 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings
     
    564,95 kr.

    This book constitutes the refereed proceedings of the 5th International Workshop on Visualization for Cyber Security held on September 15, 2008, in Cambridge, Massachusetts, USA, in conjunction with the 11th International Symposium on Recent Advances in Intrusion Detection (RAID).

  • - 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers
     
    665,95 kr.

    th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding.

  • - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
     
    645,95 kr.

    This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard,Germany.The objective of this second conference was to develop new security concepts for complex application scenarios based on systems like handhelds, phones, smartcards, RFID-chips andsmartlabelshandinhandwiththeemergingtechnologyofubiquitousandpervasive computing. In particular the conference focused on methods and technologies conce- ing the identi?cation of risks, the de?nition of security policies, and the development of security and privacy measures, especially cryptographic protocols that are related to speci?c aspects of ubiquitous and pervasive computing like mobility, location-based services,adhocnetworking,resourceallocation/restriction,invisibility,andsecureha- ware/software platforms. We received 48 submissions. Each submission was reviewed by three independent reviewers and an electronic Program Committee meeting was held via the Internet. We are very grateful to the Program Committee members for their ef?ciency in processing the work and also for the quality of their reviews and discussions. Finally the Program Committee decided to accept 14 long papers and 3 short papers. Apart from the Program Committee, we would like to thank also the other persons who contributed to the success of this conference: the additional referees for revi- ing the papers, the authors for submitting the papers, and the local organizers, and in particular Hans-Peter Wagner, for the local organization of the conference in Boppard. SPC 2005 was hosted by the Bundesakademie fur ¿ of ¿ fentlicheVerwaltung of the Federal Ministry of the Interior, and was sponsored by the DFKI and BSI.

  • - Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings
     
    592,95 kr.

    On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA).

  • - Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings
     
    607,95 kr.

    Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005.

  • - Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings
     
    570,95 kr.

    For these proceedings the papers have been divided into four main categories, namely: - Implementation of trusted computing - Attestation - PKI for trusted computing - Applications of trusted computing The 15 papers included here were selected from a total of 33 submissions.

  • - Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers
     
    645,95 kr.

    This book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on Privacy, Security, and Trust in KDD, PinKDD 2008, held in Las Vegas, NV, USA, in March 2008 in conjunction with the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008.

  • - 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers
     
    577,95 kr.

  • - Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings
     
    614,95 kr.

    This book constitutes the refereed proceedings of the Third International Conference on Pairing-Based Cryptography, Pairing 2009, held in Palo Alto, CA, USA, in August 2009.

  • - 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers
     
    588,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Digital Watermarking, IWDW 2008, held in Busan, Korea, in November 2008. information theoretic, stochastic aspects of data hiding; combination of data hiding and cryptography; reversible data hiding; data hiding in special media;

  • - Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings
     
    571,95 kr.

    This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The papers are organized in topical sections on encryption, digital signature, cryptographic protocols and reduction and privacy.

  • - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers
     
    713,95 kr.

    This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports.

  • - Second International Workshop, CASSIS 2005, Nice, France, March 8-11, 2005, Revised Selected Papers
     
    604,95 kr.

    This book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, CASSIS 2005.

  • - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings
     
    783,95 kr.

    This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014.

  • - 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers
     
    573,95 kr.

    This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011.

  • - International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings
     
    563,95 kr.

    This book constitutes the refereed proceedings of the International Workshop on Biosurveillance and Biosecurity, BioSecure 2008, held in Raleigh, NC, USA, in December 2008. biosurveillance models and outbreak detection; environmental biosurveillance and case studies.

  • - First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings
     
    804,95 kr.

    The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, public-key cryptography, pseudorandomness, analysis of stream ciphers, hash functions, broadcast encryption, and implementation.

  • - Second International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October 3-5, 2007
     
    579,95 kr.

    This volume contains the post-proceedings of the Second International Workshop on Critical Information Infrastructure Security (CRITIS 2007), that was held during October 3-5, 2007 in Benalmadena-Costa (Malaga), Spain, and was hosted by the University of Malaga, Computer Science Department.

  • - 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings
     
    582,95 kr.

    The papers are organized in topical sections on cryptosystems, signatures, identification, authentication and key management, cryptographic algorithms and protocols, stream ciphers and block ciphers, cryptographic foundations, applications and implementations, as well as security in ad hoc networks and wireless sensor networks.

  • - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012, Proceedings
     
    563,95 kr.

    This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012.